IDSC Final Quizzes 7, 8, 9, 10, 11, 12, 13
put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters
Ad hoc reporting tools
a class of computer software that seeks to reproduce or mimic human thought, decision-making, or brain functions
Artificial Intelligence
Which transaction rule is known as the 'All or nothing rule'?
Atomicity
an open source, decentralized payment system that operates in a peer-to-peer environment, without bank or central authority
Bitcoin
Which of the following stakeholders were NOT vitally affected in the Blockbuster case? All stakeholders were somewhat affected. Select the least affected one. Blockbuster's suppliers Blockbuster's video rental customers Blockbuster's stockholders Blockbuster's potential new customers
Blockbuster's suppliers
the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis.
Business Intelligence
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?
Corporate Espionage
Which of the following is NOT a type of problem that would be best suited for AI to solve? Would would AI be best suited to solve?
Creative tasks. Best suited for: Data intensive, superhuman, or repetitive tasks
databases focused on addressing the concerns of a specific problem or business unit
Data marts
Which of the following is FALSE about the stockholder theory?
Executives should balance the interests of stockholders with those of other stakeholders
Stockholder theory true statements
Executives should increase corporate profitability through legal, non-deceptive means Executives should see stakeholders as means to increase corporate profits Executives should maximize long-term corporate profits
According to the stakeholder theory, executives should do the following
Give equal consideration to the legitimate interests of all stakeholders Respect the rights of all stakeholders Adopt corporate policies that produce the optimal balance among stakeholders' interests
If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order?
Hardware, operating system, application, user
Which of the following is NOT a concern with blockchain technology's future?
Higher transaction costs due to the computing power needed for mining
Which of the following is an example of application software? Mac OS, MS Windows, MS Word, Linux
MS Word (software that performs specific tasks for an end-user)
define artificial intelligence
Machines that respond to stimulation consistent with traditional responses from humans, given the human capacity for contemplation, judgment, and intention
the Isolation principle
Multiple transactions occur independently without interference
What type of relationship is it when, for any one entity, there are many examples of another entity?
One-to-many relationship
Difference between operating systems and application software?
Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing.
Smith and Forest (2004) proposed six action areas which require attention in managing customer data. Among these action areas, secondary use of data is a concern because
Organizations have an external policy for secondary data sharing but do not follow it Organizations are often times too liberal about who is considered an affiliate and therefore give many outsiders access to customer data Many organizations have no policy on secondary internal uses of data
According to the stakeholder theory, executives should do the following EXCEPT?
Place customers' and employees' interests ahead of stockholders' interests
A variant of utility computing where vendors provide the operating system and supporting software like database management systems but where client firms write their own code?
Platform as a service
Consumer advocates objected to the merging of online data from DoubleClick and offline data from Abacus because of their concern over:
Profiling using personal data
According to the IoT article, what is the biggest challenge with IoT devices?
Protecting IoT from cyberattacks
Why do firms need to create separate data repositories for their reporting and analytics work?
Running analytics against transactional data can bog down a Transaction Processing System.
Relational database management systems (RDMS) typically provide a series of tools. Which of the following is not among the set of tools provided by RDMS? What are the correct ones?
Tools for identifying foreign keys. Correct: Tools for producing printed reports, conducting searches, and creating tables
The protocol that works its magic at the start and endpoint of Internet communication to ensure a perfect copy of a message is sent?
Transmission Control Protocol
a firm that provides hardware and services to run websites of others
Web hosting service
Peering
a situation when separate ISPs connect their networking equipment together to share traffic
protesters who seek to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage
activists
technologies that measure and analyze human body characteristics for identification or authentication purposes
biometrics
the hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks
botnets
One of the risks associated with SaaS is the
dependence on a single vendor
Internet backbone
high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet
the process of breaking data in a table down into a series of tables
normalization
the practice of tricking employees into revealing information or performing tasks that may compromise a firm's security
social engineering
The address one types into a Web browser
uniform resource locator